Следим за таймингом. Сейчас мы находимся примерно здесь: Spectacular Show or Demonstration of Force.
В любом случае то, что сегодня произошло, стало восклицательным знаком к публикации новой ядерной доктрины России, чтобы придать ей ещё большую значимость, а послание сделать более ясным.
Ссылочка для любителей вникнуть: Kahn’s Full Escalation Ladder (Herman Kahn. On Escalation. Brunswick, NJ: Routledge, 2009.).
Следим за таймингом. Сейчас мы находимся примерно здесь: Spectacular Show or Demonstration of Force.
В любом случае то, что сегодня произошло, стало восклицательным знаком к публикации новой ядерной доктрины России, чтобы придать ей ещё большую значимость, а послание сделать более ясным.
Ссылочка для любителей вникнуть: Kahn’s Full Escalation Ladder (Herman Kahn. On Escalation. Brunswick, NJ: Routledge, 2009.).
"Your messages about the movement of the enemy through the official chatbot … bring new trophies every day," the government agency tweeted. Messages are not fully encrypted by default. That means the company could, in theory, access the content of the messages, or be forced to hand over the data at the request of a government. If you initiate a Secret Chat, however, then these communications are end-to-end encrypted and are tied to the device you are using. That means it’s less convenient to access them across multiple platforms, but you are at far less risk of snooping. Back in the day, Secret Chats received some praise from the EFF, but the fact that its standard system isn’t as secure earned it some criticism. If you’re looking for something that is considered more reliable by privacy advocates, then Signal is the EFF’s preferred platform, although that too is not without some caveats. "There are several million Russians who can lift their head up from propaganda and try to look for other sources, and I'd say that most look for it on Telegram," he said. Additionally, investors are often instructed to deposit monies into personal bank accounts of individuals who claim to represent a legitimate entity, and/or into an unrelated corporate account. To lend credence and to lure unsuspecting victims, perpetrators usually claim that their entity and/or the investment schemes are approved by financial authorities.
from it